Cyber security news for all


    Microsoft Fights North Korean Hackers In Court

    According to Microsoft, the hackers targeted the email addresses of government officials, university staff and people working on nuclear projects in both the United States and South Korea.

    The cyber espionage group is said to have penetrated the accounts and networks of Microsoft customers. These are attacks in order to steal sensitive information. Emails pretend to be legitimate. The cyber group also used malware to compromise systems and steal data, the company said.

    Sensitive Information

    The cyber espionage group is said to have penetrated the accounts and networks of Microsoft customers via phishing attacks in order to steal sensitive information. Credible-looking emails pretend to be legitimate. The group also used malware to compromise systems and steal data.

    Emails received by the victim are therefore forwarded to the hackers in the background. If the pishing victim has little IT knowledge, he probably won’t even notice it. Furthermore, the hacker group installed malware on some computers to steal their data. Microsoft is making headlines again and again because it was able to prevent hacker attacks and even find those responsible directly. Most recently, US presidential candidates fell victim to a cyberattack that Microsoft discovered.

    Microsoft Hackers

    Most Of The Attacks Were Aimed At Injecting The Remote Access

    Once installed on the victim’s computer, this malware extracts information from the computer, remains there permanently and waits for further instructions. Microsoft is making increasing use of legal means to act against international hacker groups.  The teams of the Digital Crimes Unit and the Threat Intelligence Center had been on the hackers’ track for some time. In the past few months, they have been monitoring their activities and analyzing their infrastructure. They were used among other things, for sending phishing emails and hosting fake login pages. Victims were in turn lured to these sites to steal credentials for internal networks and to launch and expand attacks from there.

    Recent Articles

    Twitter confirmed to bring back account verification

    Twitter is bringing back verifications for the account verification in the beginning of 2021. Certain users will then be given a control mark again,...

    350,000 Spotify users were hacked

    At the beginning of July this year, security researchers discovered an unsecured database that contained access and other information from 350,000 Spotify users. Spotify...

    Europol sees artificial intelligence as a dangerous cyber threat

    Cyber criminals can use intelligence to carry out attacks more easily and thus cause more damage. Europol is warning of this in a joint...

    Telegram messenger a disaster in terms of privacy

    Telegram messenger is becoming more and more a secure chat with privacy in certain circles. But even very simple reports, which everyone can carry...

    Enisa reports weak IT security about the European railway sector

    With 470 billion passenger kilometers and many routes per year in Europe, the rail industry plays a large and rapidly growing role in transportation....

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox